Thursday, August 4, 2016

IBM Security Bulletin: Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail, imap, and pop3d on AIX (CVE-2015-7575, CVE-2016-0266)

TLS 1.2 is not the default communication for sendmail, imap, and pop3d, and TLS 1.2 is impacted by the MD5 Sloth vulnerability.

CVE(s): CVE-2015-7575, CVE-2016-0266

Affected product(s) and affected version(s):

        AIX 5.3, 6.1, 7.1, 7.2
        VIOS 2.2.x

        The following fileset levels are vulnerable:
        
        key_fileset = aix

        Fileset                 Lower Level  Upper Level KEY 
        ---------------------------------------------------------
        bos.net.tcp.client      5.3.12.0     5.3.12.10   key_w_fs
        bos.net.tcp.server      5.3.12.0     5.3.12.6    key_w_fs
        bos.net.tcp.client      6.1.9.0      6.1.9.102   key_w_fs
        bos.net.tcp.server      6.1.9.0      6.1.9.101   key_w_fs
        bos.net.tcp.client      7.1.3.0      7.1.3.47    key_w_fs
        bos.net.tcp.server      7.1.3.0      7.1.3.47    key_w_fs
        bos.net.tcp.client      7.1.4.0      7.1.4.1     key_w_fs
        bos.net.tcp.server      7.1.4.0      7.1.4.1     key_w_fs
        bos.net.tcp.imapd       7.2.0.0      7.2.0.0     key_w_fs
        bos.net.tcp.pop3d       7.2.0.0      7.2.0.0     key_w_fs
        bos.net.tcp.sendmail    7.2.0.0      7.2.0.0     key_w_fs
        
        Note:  to find out whether the affected filesets are installed 
        on your systems, refer to the lslpp command found in AIX user's guide.

        Example:  lslpp -L | grep -i bos.net.tcp.client

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: http://ift.tt/2anhsst
X-Force Database: http://ift.tt/1TnIyR8
X-Force Database: http://ift.tt/2axFyWO



from IBM Product Security Incident Response Team http://ift.tt/2b5NjPw

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.